Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

SY0-601: CompTIA Security Certification Exam Questions and Answers

Beoordeling
-
Verkocht
-
Pagina's
3
Cijfer
A+
Geüpload op
08-04-2022
Geschreven in
2021/2022

Which of the following disaster recovery sites would require the MOST time to get operations back online? a) Colocation b) Cold c) Hot d) Warm Correct answer- b) Cold 02. A Chief Financial Officer (CFO) has been receiving email messages that have suspicious links embedded from unrecognized senders. The emails ask the recipient for identity verification. The IT department has not received reports of this happening to anyone else. Which of the following is the MOST likely explanation for this behavior? a) The CFO is the target of a whaling attack. b) The CFO is the target of identity fraud. c) The CFO is receiving spam that got past the mail filters. d) The CFO is experiencing an impersonation attack. Correct answer- a) The CFO is the target of a whaling attack. 03. Why do vendors provide MD5 values for their software patches? a) To provide the necessary key for patch activation b) To allow the downloader to verify the authenticity of the site providing the patch c) To ensure that auto-updates are enabled for subsequent patch releases d) To allow the recipient to verify the integrity of the patch prior to installation Correct answer- d) To allow the recipient to verify the integrity of the patch prior to installation 04. The IT department receives a call one morning about users being unable to access files on the network shared drives. An IT technician investigates and determines the files became encrypted at 12:00 a.m. While the files are being recovered from backups, one of the IT supervisors realizes the day is the birthday of a technician who was fired two months prior. Which of the following describes what MOST likely occurred? a) The fired technician placed a logic bomb. b) The fired technician installed a rootkit on all the affected users' computers. c) The fired technician installed ransomware on the file server. d) The fired technician left a network worm on an old work computer. Correct answer- a) The fired technician placed a logic bomb. 05. You have been asked to provide a virtualized environment. Which of the following makes it possible for many instances of an operating system to be run on the same machine? a) API b) Virtual machine c) Hypervisor d) Container Correct answer- c) Hypervisor To get preparation tips for CompTIA SY0-601 Exam: Correct answer- Click Here: 06. Which of the following would be the BEST method to prevent the physical theft of staff laptops at an open-plan bank location with a high volume of customers each day? a) Guards at the door b) Cable locks c) Visitor logs d) Cameras Correct answer- b) Cable locks 07. What is the term given to a framework or model outlining the phases of attack to help security personnel defend their systems and respond to attacks? a) Command and control b) Intrusion kill chain c) Cyber-incident response d) CIRT Correct answer- b) Intrusion kill chain 08. A security manager needed to protect a high-security datacenter, so the manager installed an access control vestibule that can detect an employee's heartbeat, weight, and badge. Which of the following did the security manager implement? a) A physical control b) A corrective control c) A compensating control d) A managerial control Correct answer- a) A physical control 09. Joe, an employee, knows he is going to be fired in three days. Which of the following characterizations describes the employee? a) An insider threat b) A competitor c) A hacktivist d) A state actor Correct answer- a) An insider threat 10. An organization has a policy in place that states the person who approves firewall controls/changes cannot be the one implementing the changes. Which of the following describes this policy? a) Change management b) Job rotation c) Separation of duties d) Least privilege Correct answer- c) Separation of duties

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

SY0-601: CompTIA Security Certification
Exam Questions and Answers

01. Which of the following disaster recovery sites would require the MOST time to get
operations back online?
a) Colocation
b) Cold
c) Hot
d) Warm Correct answer- b) Cold

02. A Chief Financial Officer (CFO) has been receiving email messages that have
suspicious links embedded from unrecognized senders.
The emails ask the recipient for identity verification. The IT department has not received
reports of this happening to anyone else.
Which of the following is the MOST likely explanation for this behavior?
a) The CFO is the target of a whaling attack.
b) The CFO is the target of identity fraud.
c) The CFO is receiving spam that got past the mail filters.
d) The CFO is experiencing an impersonation attack. Correct answer- a) The CFO is
the target of a whaling attack.

03. Why do vendors provide MD5 values for their software patches?
a) To provide the necessary key for patch activation
b) To allow the downloader to verify the authenticity of the site providing the patch
c) To ensure that auto-updates are enabled for subsequent patch releases
d) To allow the recipient to verify the integrity of the patch prior to installation Correct
answer- d) To allow the recipient to verify the integrity of the patch prior to installation

04. The IT department receives a call one morning about users being unable to access
files on the network shared drives. An IT technician investigates and determines the
files became encrypted at 12:00 a.m.
While the files are being recovered from backups, one of the IT supervisors realizes the
day is the birthday of a technician who was fired two months prior.
Which of the following describes what MOST likely occurred?
a) The fired technician placed a logic bomb.
b) The fired technician installed a rootkit on all the affected users' computers.
c) The fired technician installed ransomware on the file server.
d) The fired technician left a network worm on an old work computer. Correct answer- a)
The fired technician placed a logic bomb.

Geschreven voor

Vak

Documentinformatie

Geüpload op
8 april 2022
Aantal pagina's
3
Geschreven in
2021/2022
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$13.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
EvaTee Phoenix University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
5224
Lid sinds
4 jaar
Aantal volgers
3570
Documenten
55987
Laatst verkocht
5 uur geleden
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.8

952 beoordelingen

5
453
4
167
3
174
2
48
1
110

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen